Papers by Kapali Viswanathan
Delay/Disruption Tolerant Networking (DTN) introduces a network model in which communications can... more Delay/Disruption Tolerant Networking (DTN) introduces a network model in which communications can be subject to long delays and/or intermittent connectivity. DTN specifies the use of public-key cryptography to secure the confidentiality and integrity of messages in transit. The use of public-key cryptography posits the need for certification of public keys and revocation of certificates. This document formally defines the DTN key management problem and then provides a high-level design solution for delay and disruption tolerant distribution and revocation of public-key certificates along with relevant design options and recommendations for design choices.
Bookmarks Related papers MentionsView impact
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing (CMC'99). Group Communications (IWGC). Internet '99 (IWI'99). Industrial Applications on Network Computing (INDAP). Multimedia Network Systems (MMNS). Security (IWSEC). Parall
ABSTRACT
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2005
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Signal and Image Processing and Applications / 716: Artificial Intelligence and Soft Computing, 2011
Bookmarks Related papers MentionsView impact
2010 National Conference On Communications (NCC), 2010
Bookmarks Related papers MentionsView impact
Document Recognition and Retrieval XVII, 2010
This paper presents an algorithm called CIPDEC (Content Integrity of Printed Documents using Erro... more This paper presents an algorithm called CIPDEC (Content Integrity of Printed Documents using Error Correc-tion), which identifies any modifications made to a printed document. CIPDEC uses an error correcting code for accurate detection of addition/deletion of even a few pixels. A ...
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2002
Bookmarks Related papers MentionsView impact
2012 IEEE International Symposium on Information Theory Proceedings, 2012
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2003
Bookmarks Related papers MentionsView impact
2009 IEEE Information Theory Workshop, 2009
Bookmarks Related papers MentionsView impact
2010 IEEE International Symposium on Information Theory, 2010
Bookmarks Related papers MentionsView impact
The process of selection is omnipresent in the real world and modeling this process as a cryptolo... more The process of selection is omnipresent in the real world and modeling this process as a cryptologic protocol will enable cross use of techniques among similar protocol applications, which will eventually lead to better understanding and re nement of these applications. We present a proposal for a specialised selection protocol with anonymity as the security service. An area for its application is anonymous peer review, where no peer should know the identity of the reviewer.
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2004
Bookmarks Related papers MentionsView impact
ABSTRACT
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Information and Communications Security, 2002
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2006
Bookmarks Related papers MentionsView impact
Uploads
Papers by Kapali Viswanathan